http-sniffer Logo

http-sniffer

0
Free
Visit Website

A multi-threading tool to sniff HTTP header records beyond TCP flow statistics, supporting both offline PCAP file and live NIC sniffing. It exports statistics of TCP flows, HTTP request/response pairs, and supports JSON format output. Dependencies include libpcap for traffic packet extraction, json-c for JSON parsing, and scons for project building. To use, run 'scons' in the root folder to compile, then specify the live interface with 'ifconfig' in the terminal (e.g., en0) or store output flows as JSON. Output includes brief CSV format.

FEATURES

ALTERNATIVES

A tool for classifying packets into flows based on 4-tuple without additional processing.

Python module for fast packet parsing with TCP/IP protocol definitions.

A Fake Protocol Server tool with support for multiple network services and protocols.

Tcpreplay is a suite of Open Source utilities for editing and replaying captured network traffic.

A framework for creating and executing pynids-based decoders and detectors of APT tradecraft

Akamai Enterprise Application Access is a ZTNA solution that provides secure, identity-based access to private applications without exposing the network.

Passively maps and visually displays ICS/SCADA network topology for network security

Unfurl is a URL analysis tool that extracts and visualizes data from URLs, breaking them down into components and presenting the information visually.